UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must disable ESXi Shell unless needed for diagnostics or troubleshooting.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-99999-ESXI5-000136 SRG-OS-99999-ESXI5-000136 SRG-OS-99999-ESXI5-000136_rule Medium
Description
The ESXi Shell is an interactive command line environment available locally from the DCUI or remotely via SSH. Activities performed from the ESXi Shell bypass vCenter RBAC and audit controls. The ESXi shell should only be turned on when needed to troubleshoot/resolve problems that cannot be fixed through the vSphere client.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-99999-ESXI5-000136_chk )

From the vSphere Client, select the host then select "Configuration >> Security Profiles". In the Services section select "Properties". Select the "ESXi Shell" and click Options. Verify the ESXi Shell is set to "Start and stop manually".

If the ESXi Shell service startup policy is not set to "Start and stop manually", this is a finding.

Fix Text (F-SRG-OS-99999-ESXI5-000136_fix)
From the vSphere Client, select the host then select "Configuration >> Security Profiles". In the Services section select "Properties". Select the "ESXi Shell" and click Options. Stop the ESXi Shell and select the option to "Start and stop manually".